US12505445B2 - Fraud detection systems and methods - Google Patents
Fraud detection systems and methodsInfo
- Publication number
- US12505445B2 US12505445B2 US17/824,688 US202217824688A US12505445B2 US 12505445 B2 US12505445 B2 US 12505445B2 US 202217824688 A US202217824688 A US 202217824688A US 12505445 B2 US12505445 B2 US 12505445B2
- Authority
- US
- United States
- Prior art keywords
- transaction
- given
- sender
- recipient
- fraudulent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/407—Cancellation of a transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B6/00—Tactile signalling systems, e.g. personal calling systems
Definitions
- Embodiments of the present invention are directed to payment systems that provide real-time fraud risk scoring during a transaction.
- Embodiments may provide risk scores prior to payment to enable the user or the user's financial institution to cancel the transaction prior to the transfer of any funds.
- Embodiments may provide alerts to the user that may educate the user as to the potential fraudulent activity, and may provide the user with one or more sources of additional information. This may slow down the transaction to provide the user an opportunity to make an informed decision about whether to proceed with the transaction.
- the networks may include a communications interface.
- the networks may include one or more processors.
- the networks may include a memory having instructions stored thereon. When executed by the one or more processors the instructions may cause the one or more processors to receive, using the communications interface, transaction information associated with a transaction from a requesting system.
- the instructions may cause the one or more processors to generate a fraud risk score based on the transaction information.
- the instructions may cause the one or more processors to determine that the fraud risk score is indicative that the transaction is likely fraudulent.
- the instructions may cause the one or more processors to transmit an alert to a user device that informs a user of the user device that the transaction is likely fraudulent prior to generating an approval decision for the transaction.
- the instructions further cause the one or more processors to validate the user prior to generating the fraud risk score.
- the alert may include information about one or more possible forms of fraudulent activity.
- the alert may include a link to one or more sources of more detailed information about one or more possible forms of fraudulent activity.
- the alert may include an override feature that enables the user to accept the transaction.
- the alert may include a cancellation feature that enables the user to terminate the transaction without completing payment.
- the transaction information may include one or more variables selected from the group consisting of a payment amount, an identifier of the user, a recipient identifier, location data of the user, and location data of the recipient.
- Some embodiments of the present technology may encompass methods of performing fraud detection.
- the methods may include receiving, using a communications interface, transaction information associated with a transaction from a requesting system.
- the methods may include generating a fraud risk score based on the transaction information.
- the methods may include determining that the fraud risk score is indicative that the transaction is likely fraudulent.
- the methods may include transmitting an alert to a user device that informs a user of the user device that the transaction is likely fraudulent prior to generating an approval decision for the transaction.
- the fraud risk score may be generated using a machine learning model.
- the machine learning model may be trained using transaction information from known fraudulent transactions.
- the machine learning model may include a deterministic machine learning model.
- the machine learning model may include a non-deterministic machine learning model.
- the methods may include determining one or more device characteristics associated with the requesting system. A form of the alert may be based on the one or more device characteristics.
- the one or more device characteristics may include device capabilities of the requesting system.
- Some embodiments of the present technology may encompass non-transitory computer-readable mediums having instructions stored thereon.
- the instructions When executed by one or more processors, the instructions may cause the one or more processors to receive, using the communications interface, transaction information associated with a transaction from a requesting system.
- the instructions may cause the one or more processors to generate a fraud risk score based on the transaction information.
- the instructions may cause the one or more processors to determine that the fraud risk score is indicative that the transaction is likely fraudulent.
- the instructions may cause the one or more processors to transmit an alert to a user device that informs a user of the user device that the transaction is likely fraudulent prior to generating an approval decision for the transaction.
- the instructions may further cause the one or more processors to receive additional information associated with one or both of the user and a recipient.
- the fraud risk score may be generated based at least in part on the additional information.
- the additional information may include information associated with one or both of the user and the recipient selected from the group consisting of device information, payment history information, token activity information and transaction velocity information.
- the alert may cause the user device to emit a haptic notification.
- the fraud risk score may be generated using a machine learning model that is periodically retrained with updated fraudulent transaction information.
- the requesting system may include a merchant point of sale device.
- FIG. 1 illustrates a system for facilitating payments according to an embodiment of the present invention.
- FIG. 2 is a flowchart illustrating a process for performing fraud risk detection according to an embodiment of the present invention.
- FIG. 3 illustrates a fraud risk alert according to an embodiment of the present invention.
- FIG. 4 is a block diagram of a computing system according to an embodiment of the present invention.
- Embodiments of the present invention are directed to fraud detection techniques that may help prevent fraudulent transactions that have been initiated by a rightful owner of a payment account.
- Embodiments may perform fraud risk scoring measures and may alert a user and/or the user's financial institution of any potential fraud prior to debiting a payment from the payment account.
- Embodiments may therefore enable transactions suspected of being fraudulent to be canceled unilaterally by the financial institution and/or alerts to be sent to the user that may enable the user to make an informed decision of whether to proceed with the transaction.
- Embodiments may provide technical solutions that provide network visibility that help consumers and merchants make better, more informed transaction decisions.
- the system may include one or more merchant systems 100 that provide goods and/or services.
- Each merchant system 100 may include one or more computing systems that facilitate interactions with users and/or back-end systems.
- the merchant systems 100 may be used to conduct transactions, manage inventory, invoice users, and/or perform any number of other functions.
- Each merchant system 100 may be associated with one or more merchant financial institutions 106 that may handle receipt of payments and/or authentication of a given merchant system 100 during a particular transaction. While referred to as merchant systems, it will be appreciated that such systems may encompass systems and/or devices that are associated with non-merchant entities, including individuals.
- merchant systems may be understood to refer to systems and/or devices that may be involved in payment transactions.
- Users may interact with the merchant systems 100 using one or more user devices 102 that communicate with the merchant systems 100 via one or more wired and/or wireless networks 104 .
- Data transmitted across the networks 104 may be secured using encryption techniques, hypertext transfer protocol secure (HTTPS), secure sockets layer (SSL), transport layer security (TLS), and/or other security protocol.
- the user devices 102 may include mobile phones, tablet computers, personal computers, e-readers, and the like.
- the user devices 102 may include computing devices, such as point of sale devices, that may be positioned at brick-and-mortar locations of a given merchant that may be usable by the users to interact with a given merchant system 100 .
- the user devices 102 may access the merchant systems 100 via software applications and/or websites that are associated with and/or operated by a given merchant and that provide user interfaces that enable the users to complete transactions with the merchant systems 100 .
- Each user may be associated with one or more user financial institutions 108 , which may each provide one or more payment accounts that are associated with the user and usable to pay for various transactions.
- the user financial institutions 108 may also verify the identity of users and/or provide assurances that a selected payment account has sufficient funds to cover a particular transaction prior to the completion of the transaction.
- a single financial institution may serve as both the merchant financial institution 106 and the user financial institution 108 , while in other embodiments the merchant financial institution 106 and the user financial institution 108 may be distinct entities.
- the payment and authentication network 110 may establish relationships with any number of user financial institutions 108 . This may enable the payment and authentication network 110 to facilitate transactions that utilize payment accounts with each of the user financial institutions 108 . Each user may create an account with the payment and authentication network 110 . The user may then link one or more payment accounts from one or more user financial institutions 108 with the user's account with the payment and authentication network 110 . Once having a registered account, the user may be able to utilize the authentication and fraud risk services provided by the payment and authentication network 110 when conducting transactions with merchant systems 100 .
- the payment and authentication network 110 may include a machine learning risk model (such as a Gradient Boosted Trees model) that has been trained to predict the probability that a given transaction between a sender (payer) and a recipient is fraudulent.
- a machine learning risk model such as a Gradient Boosted Trees model
- the risk model may be provided with data from a number of prior fraudulent transactions and a number of prior valid transactions.
- the risk model may be trained to identify various fraud risk factors (including transaction characteristics, merchant information, etc.) that may be indicative of fraudulent activity.
- the various factors may include, without limitation, a standard deviation of an amount sent and/or received by a sender and/or recipient (possibly over a predetermined time period), an inquiry/transaction amount for the present transaction, information related to dollar amounts received by the recipient in a particular time period, information related to dollar amounts sent and/or received by the sender in a particular time period, a number of successful transactions between the sender and recipient (possibly over a predetermined time period), a time elapsed since a first payment sent and/or received by the sender, a time elapsed since a most recent payment sent and/or received by the recipient, an average dollar amount in transactions between the sender and recipient (possibly over a predetermined time period), a total amount send and/or received by the recipient and/or sender (possibly over a predetermined time period), an average number of transactions per day by the sender and/or recipient (possibly over a predetermined time period), a maximum and/or minimum dollar amount sent and/or received by the
- a number of transactions that are known to be fraudulent and/or authentic may be provided to the machine learning model as input variables.
- Each transaction may include an indication of whether the particular transaction was fraudulent, along with other transaction and/or other information.
- each transaction may include one or more pieces of transaction information, such as a payment amount, a time and/or date of the transaction, location data for the sender and/or recipient, a recipient identifier, a sender identifier, and/or other data.
- some or all of the transactions may include additional information related to the recipient and/or sender, such as one or more of the fraud risk factors outlined above.
- the transaction information (and possibly the additional information) may be analyzed by the machine learning model in view of the indication of whether each transaction was authentic or fraudulent, enabling the machine learning model to generate a number of sets of transaction characteristics that are indicative of a high risk of fraud.
- the relevant transaction information and/or additional information may be supplied to the machine learning model, which may identify transaction characteristics associated with the new transaction to determine whether the new transaction is likely fraudulent.
- the risk model may behave deterministically (e.g., an inquiry with the same information scored by the model with the same feature values will always produce the same score). In other embodiments the risk model can be updated/retrained multiple times (e.g., the model can change upon retraining of the model, when the model goes through model governance, and/or when a new version of the model is deployed).
- the payment and authentication network 110 may monitor current scams and other fraudulent activity. For example, the payment and authentication network 110 may receive information on fraudulent transactions and scams from the various user financial institutions 108 and/or other external sources. The payment and authentication network 110 and/or risk model may analyze this information to identify characteristics that are indicative of such fraud.
- the payment and authentication network 110 and/or risk model may be supplied with transaction information and/or other data from known fraudulent transactions to identify combinations of different fraud risk factors (such as those described above) that may be indicative of a fraudulent transaction based on the information on fraudulent transactions and scams provided by the various user financial institutions 108 and/or other external sources.
- the payment and authentication network 110 may also maintain and update information and educational resources on the various fraudulent activities that may be used to instruct users and/or user financial institutions on how to handle various fraudulent activity. For example, information on what users should look for to detect fraudulent transactions and/or steps that may be taken to avoid and/or reduce the threat of falling victim to fraud.
- the payment and authentication network 110 may monitor trends in various scams, which may be used to keep information up to date and to best educate the various partners and users of the payment and authentication network 110 .
- FIG. 2 is a flowchart illustrating a process 200 of performing fraud detection according to an embodiment of the present invention.
- Process 200 may be performed by a user financial institution and/or the payment and authentication network 110 .
- Process 200 may begin at block 202 by a user initiating a payment transaction at a merchant point of sale device (or other device used to conduct a payment transaction between two or more entities), which may be operated by one or more merchant systems 100 .
- the user may select one or more goods, services, and/or charitable contributions for purchase.
- the user may be provided with a price of the selections and may select one or more payment options to use for payment.
- the user may opt to pay for the selections using a payment source that is linked to the payment and authentication network 110 .
- the merchant system 100 may direct the user to an authentication page associated with the payment and authentication network 110 .
- the merchant system 100 may also provide transaction data to the payment and authentication network 110 .
- the transaction information may include information associated with the transaction, such as user identification information provided by the user and/or retrieved from an account associated with the user at the merchant system 100 (a name, an address, a phone number, an account number or other identifier of the selected payment option, etc.), a user device identifier, a payment amount, a merchant name and/or other merchant identifier, a unique transaction identifier (which may be generated by the merchant system 100 ), and/or other information associated with the transaction.
- the user may be validated with the payment and authentication network 110 at operation 204 .
- the authentication system may validate the user using validation information, such as a token, the user's name, the user's address, and/or other information. This information may be supplied with and/or extracted from the transaction information and/or may be provided by the user. To validate the user, the validation information may be compared with similar information (name, address, etc.) from other sources. For example, similar information may be pulled from 1) profile data from the user's account with the payment and authentication network 110 , 2) the user identification information supplied by the merchant system 100 , and/or 3) mobile network operator (MNO) data (such as user identification information, device information (such as an international mobile equipment identity (IMEI)), phone numbers, etc.
- MNO mobile network operator
- the MNO data may be retrieved from an external source, which may be identified using user information included in the transaction information. For example, the phone number In some embodiments, such as when the user device 102 is not a mobile phone, other information may be used, such as another device identifier, IP address, and/or other information.
- the payment and authentication network 110 may compare the user's name and address and/or other information to the validation information to see if similar information from the various sources match one another. If the information matches, the user may be validated and the user may be redirected to an authentication page of a website or software interface associated with the user's financial institution 108 .
- the user may actively log in or be passively logged into the user financial institution 108 and may select one or more payment accounts associated with the user financial institution 108 at operation 206 .
- the consumer may provide one or more credentials (such as a username, password, biometric token, and/or other credential) associated with the consumer financial institution 108 to the authentication page to be authenticated by the consumer financial institution 108 prior to any funds being withdrawn from the selected payment account.
- the authentication of the consumer provides an assurance to the merchant that the transaction has been properly authorized by the consumer and consumer financial institution 108 and that the merchant will receive good funds, thus reducing the risk of payment returns due to unauthorized transactions.
- the consumer financial institution 108 may use information like mobile authentication, device ID, user patterns, face or other biometrics or other identifiers to authenticate the consumer.
- the authentication of the consumer may be done by the consumer financial institution 108 , a third party authorized by the consumer financial institution 108 and/or the payment and authentication network 110 .
- a default set of authentication factors may be used to authenticate consumers for each consumer financial institution 108 and/or some or all of the consumer financial institutions 108 may pre-select their own set of factors and/or authentication measures (biometric, multi-factor, etc.) that will be considered in the authentication process.
- a passive authentication process may be initiated.
- the payment and authentication network 110 may compare information such as device identifiers, IP addresses, browser cookies, and/or other information to data from the consumers account with the payment and authentication network 110 to authenticate the consumer, without requiring the consumer to access an authentication page of the consumer financial institution 108 .
- the payment and authentication system 110 may generate a risk score at operation 208 .
- the risk score may be determine using a risk score model, which may utilize machine learning in some embodiments.
- the payment and authentication network 110 may receive transaction information from the user and/or merchant system 100 associated with the transaction.
- the transaction information may include a payment amount, an identifier of the user, a recipient identifier, location data of the user and/or recipient.
- the transaction data can include location data provided by one or more financial institutions. Additional information may be received by the payment and authentication network 110 from the user device 102 , merchant system 100 , and/or other external source.
- the additional information may include device information (such as a device identifier), user/recipient payment history information, token activity information associated with the user and/or the merchant system 100 , transaction velocity information associated with the merchant, any of the fraud risk factors outlined above, and the like.
- the payment and authentication network 110 may analyze some or all of the collected information.
- the analysis may involve supplying at least some of the collected information (e.g., relevant transaction information and/or additional information) to the machine learning model (e.g., risk model), which may identify transaction characteristics associated with the new transaction (such as by comparing the transaction characteristics to those of known fraudulent transactions and/or by determining a category assignment for the transaction based on the machine learning data) to determine whether the transaction is likely fraudulent.
- the machine learning model e.g., risk model
- the collected information may be analyzed in at least one of the following ways: (1) looking at previous payment amounts both sent AND received by at least one of the user or recipient in a payment (e.g., a payment and authentication network 110 user), (2) aggregating previous payments with the same user and same receiver, and/or (3) aggregating previous payments where the current user is the recipient and the current recipient is the user.
- a payment e.g., a payment and authentication network 110 user
- two or more of the above ways can be used simultaneously to analyze the sender/receiver data.
- the risk model may generate a risk score (e.g., a numerical value) that is indicative of a likelihood that the present transaction is fraudulent.
- key factors that describe what aspects of the payment were important in determining the score may be provided.
- the key factors may be non-numeric character strings.
- the risk score may be provided to the user financial institution 108 , possibly along with an explanation of a reason for the transaction being high risk (when applicable).
- the calculation of the risk score may be consistent across all payment accounts, may vary depending on a type of payment media involved, and/or may vary depending on the user financial institution 108 associated with the selected payment account. For example, one or more user financial institutions 108 may instruct the payment and authentication network 110 to weigh risk factors differently within the risk model and/or may have different risk acceptance thresholds.
- Each user financial institution 108 may have its own proprietary risk score threshold system, while in other embodiments some or all of the user financial institutions 108 may include a same risk score threshold system.
- Each risk score threshold system may include one or more thresholds for triggering one or more fraud risk actions based on the risk score of the transaction. For example, in some embodiments, upon having a sufficiently acceptable fraud risk score, the user financial institution 108 may approve the payment and provide the user a confirmation the payment was successfully completed. If the risk score is below a lowest threshold, the payment and authentication network 110 and/or the user financial institution 108 may automatically cancel the transaction and inform the user of the cancellation.
- the payment and authentication network 110 and/or the user financial institution 108 may just indicate the transaction was canceled/declined and/or may include an indication of why the transaction was canceled (e.g., risk of fraud).
- Another threshold may trigger the payment and authentication network 110 and/or the user financial institution 108 to conduct a manual review of the transaction for fraud and/or Office of Foreign Assets Control (OFAC) risk. This may result in a delay of payment and/or a cancellation of the transaction.
- OFAC Office of Foreign Assets Control
- the payment and authentication network 110 and/or the user financial institution 108 may notify the user of the pending review, which may enable the user to have an opportunity to change to a non-reviewed payment type (e.g., cash), cancel the transaction, and/or reach out to the payment and authentication network 110 and/or the user financial institution 108 to get more information about the pending transaction and/or potential risk.
- the notification may include a phone number, URL, email address, and/or other communication address that the user may use to discuss or otherwise gain additional information related to the present transaction.
- the risk score may indicate a potential scam risk, which may trigger an additional confirmation step by the user to complete the payment transaction.
- the payment and authentication network 110 may alert the user that the transaction may be a scam or other fraud and may give the user the option to cancel the transaction. This may provide the user with time and information necessary to make an informed decision regarding whether to continue with the transaction.
- the payment and authentication network 110 may require a confirmation from the user if the user wishes to continue with the transaction.
- the user financial institution 108 and/or the payment and authentication network 110 may inform the user that if the user process with the transaction that has been flagged as a possible scam, the payment and authentication network 110 and/or user financial institution 108 may reduce and/or eliminate any fraud protection features offered in relation to the transaction. This enables the payment and authentication network 110 and/or user financial institution 108 to protect themselves from possible scams and fraud in the event that the user is comfortable assuming the risk that the transaction is part of a scam and/or other fraudulent activity.
- the alert may include additional information about one or more known scam types.
- the information may include a description of known scams, which may include warning signs for the user to look for in identifying a given scam.
- the alert may include an indication of why the payment and authentication network 110 flagged the transaction as potentially being a scam and/or otherwise fraudulent.
- the information may also include a link (such as a universal resource locator (URL)) that directs the user to one or more sources that contain detailed information on known scams that may assist the user in making an informed decision.
- URL universal resource locator
- the information available to the user may be related to scams that are potentially similar to the current transaction, related to the most common scams, related to the most currently common scams (such as scams that are most frequently occurring within a given period of time, such as the last 90 days, last 30 days, last week, etc.), and/or may be provided in some other manner.
- the alert may include a phone number, URL, email address, and/or other communication address that the user may use establish a communication link with an expert who may provide guidance on the potential fraudulent activity.
- the alert may be sent via various electronic notification formats.
- the alert may be provided within a transaction window of the user interface of the user device 102 , via a push notification, an email, a short message service (SMS) message, a voice alert, as haptic feedback, and/or other format.
- the alert may be sent in a format chosen by the user, payment and authentication network 110 , and/or the user financial institution 108 .
- information (such as the device information, location information, etc.) may be used by the payment and authentication network 110 to determine a proper format for the alert.
- FIG. 3 illustrates one embodiment of a fraud risk alert.
- the alert is provided as a page within a user interface of a website and/or software application (such as a merchant web portal) that is being used to conduct the transaction.
- the alert may take many forms, including emails, SMS messages, push notifications, audio messages, haptic alerts, and the like.
- multiple forms of alerts may be sent to the user for a given transaction.
- the risk scoring model may analyze one or more details of the payment request, such as spelling of entity names within the payment request, formatting of different elements (such as company names/logos, etc.), a monetary amount of the payment request, a timing of the payment request, a frequency of requests associated with the requesting party, and/or other information.
- fraudulent requests include one or more errors, such as typographical errors, formatting errors, and the like.
- the risk scoring model may analyze the request and detect any such errors or other red flags that may be indicative of a fraudulent request. If fraud is detected, the payment and authentication network may alert the user and/or provide additional information on possible scams and/or other fraudulent activity such as described above.
- FIG. 4 A computer system as illustrated in FIG. 4 may be incorporated as part of the previously described computerized devices.
- computer system 400 can represent some of the components of computing devices, such as merchant system 100 , user device 102 , merchant financial institution 106 , user financial institution 108 , payment and authentication network 110 , and/or other computing devices described herein.
- FIG. 4 provides a schematic illustration of one embodiment of a computer system 400 that can perform the methods provided by various other embodiments, as described herein.
- FIG. 4 is meant only to provide a generalized illustration of various components, any or all of which may be utilized as appropriate.
- FIG. 4 therefore, broadly illustrates how individual system elements may be implemented in a relatively separated or relatively more integrated manner.
- the computer system 400 may further include (and/or be in communication with) one or more non-transitory storage devices 425 , which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, a solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable and/or the like.
- RAM random access memory
- ROM read-only memory
- Such storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
- the computer system 400 might also include a communication interface 430 , which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a BluetoothTM device, an 502.11 device, a Wi-Fi device, a WiMAX device, an NFC device, cellular communication facilities, etc.), and/or similar communication interfaces.
- the communication interface 430 may permit data to be exchanged with a network (such as the network described below, to name one example), other computer systems, and/or any other devices described herein.
- the computer system 400 will further comprise a non-transitory working memory 435 , which can include a RAM or ROM device, as described above.
- the computer system 400 also can comprise software elements, shown as being currently located within the working memory 435 , including an operating system 440 , device drivers, executable libraries, and/or other code, such as one or more application programs 445 , which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
- an operating system 440 operating system 440
- device drivers executable libraries
- application programs 445 may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
- one or more procedures described with respect to the method(s) discussed above might be implemented as code and/or instructions executable by a computer (and/or a processor within a computer); in an aspect, then, such special/specific purpose code and/or instructions can be used to configure and/or adapt a computing device to a special purpose computer that is configured to perform one or more operations in accordance with the described methods.
- a set of these instructions and/or code might be stored on a computer-readable storage medium, such as the storage device(s) 425 described above.
- the storage medium might be incorporated within a computer system, such as computer system 400 .
- the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure and/or adapt a special purpose computer with the instructions/code stored thereon.
- These instructions might take the form of executable code, which is executable by the computer system 400 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computer system 400 (e.g., using any of a variety of available compilers, installation programs, compression/decompression utilities, etc.) then takes the form of executable code.
- a risk management engine configured to provide some or all of the features described herein relating to the risk profiling and/or distribution can comprise hardware and/or software that is specialized (e.g., an application-specific integrated circuit (ASIC), a software method, etc.) or generic (e.g., processing unit 410 , applications 445 , etc.) Further, connection to other computing devices such as network input/output devices may be employed.
- ASIC application-specific integrated circuit
- generic e.g., processing unit 410 , applications 445 , etc.
- Some embodiments may employ a computer system (such as the computer system 400 ) to perform methods in accordance with the disclosure. For example, some or all of the procedures of the described methods may be performed by the computer system 400 in response to processing unit 410 executing one or more sequences of one or more instructions (which might be incorporated into the operating system 440 and/or other code, such as an application program 445 ) contained in the working memory 435 . Such instructions may be read into the working memory 435 from another computer-readable medium, such as one or more of the storage device(s) 425 . Merely by way of example, execution of the sequences of instructions contained in the working memory 435 might cause the processing unit 410 to perform one or more procedures of the methods described herein.
- a computer system such as the computer system 400
- some or all of the procedures of the described methods may be performed by the computer system 400 in response to processing unit 410 executing one or more sequences of one or more instructions (which might be incorporated into the operating system 440 and/or other code, such as an application program 4
- machine-readable medium and “computer-readable medium,” as used herein, refer to any medium that participates in providing data that causes a machine to operate in a specific fashion.
- various computer-readable media might be involved in providing instructions/code to processing unit 410 for execution and/or might be used to store and/or carry such instructions/code (e.g., as signals).
- a computer-readable medium is a physical and/or tangible storage medium.
- Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media.
- Non-volatile media include, for example, optical and/or magnetic disks, such as the storage device(s) 425 .
- Volatile media include, without limitation, dynamic memory, such as the working memory 435 .
- Transmission media include, without limitation, coaxial cables, copper wire, and fiber optics, including the wires that comprise the bus 405 , as well as the various components of the communication interface 430 (and/or the media by which the communication interface 430 provides communication with other devices).
- transmission media can also take the form of waves (including without limitation radio, acoustic and/or light waves, such as those generated during radio-wave and infrared data communications).
- Common forms of physical and/or tangible computer-readable media include, for example, a magnetic medium, optical medium, or any other physical medium with patterns of holes, a RAM, a PROM, EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read instructions and/or code.
- the communication interface 430 (and/or components thereof) generally will receive the signals, and the bus 405 then might carry the signals (and/or the data, instructions, etc. carried by the signals) to the working memory 435 , from which the processor(s) 410 retrieves and executes the instructions.
- the instructions received by the working memory 435 may optionally be stored on a non-transitory storage device 425 either before or after execution by the processing unit 410 .
- machine-readable instructions may be stored on one or more machine-readable mediums, such as CD-ROMs or other type of optical disks, floppy disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, flash memory, or other types of machine-readable mediums suitable for storing electronic instructions.
- machine-readable mediums such as CD-ROMs or other type of optical disks, floppy disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, flash memory, or other types of machine-readable mediums suitable for storing electronic instructions.
- the methods may be performed by a combination of hardware and software.
- a list of “at least one of A, B, and C” includes any of the combinations A or B or C or AB or AC or BC and/or ABC (i.e., A and B and C).
- a list of “at least one of A, B, and C” may also include AA, AAB, AAA, BB, etc.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (18)
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/824,688 US12505445B2 (en) | 2021-05-25 | 2022-05-25 | Fraud detection systems and methods |
| US18/100,982 US12323454B2 (en) | 2021-05-25 | 2023-01-24 | Fraud networks |
| US18/100,986 US20230169618A1 (en) | 2021-05-25 | 2023-01-24 | Safety notifications |
| US18/100,979 US20230162198A1 (en) | 2021-05-25 | 2023-01-24 | Push notifications and address risking |
| US18/100,984 US20230162311A1 (en) | 2021-05-25 | 2023-01-24 | Stale notifications |
| US19/195,092 US20250280030A1 (en) | 2021-05-25 | 2025-04-30 | Fraud networks |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163192979P | 2021-05-25 | 2021-05-25 | |
| US17/824,688 US12505445B2 (en) | 2021-05-25 | 2022-05-25 | Fraud detection systems and methods |
Related Child Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/100,984 Continuation-In-Part US20230162311A1 (en) | 2021-05-25 | 2023-01-24 | Stale notifications |
| US18/100,979 Continuation-In-Part US20230162198A1 (en) | 2021-05-25 | 2023-01-24 | Push notifications and address risking |
| US18/100,986 Continuation-In-Part US20230169618A1 (en) | 2021-05-25 | 2023-01-24 | Safety notifications |
| US18/100,982 Continuation-In-Part US12323454B2 (en) | 2021-05-25 | 2023-01-24 | Fraud networks |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220383323A1 US20220383323A1 (en) | 2022-12-01 |
| US12505445B2 true US12505445B2 (en) | 2025-12-23 |
Family
ID=84194157
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/824,688 Active 2043-01-20 US12505445B2 (en) | 2021-05-25 | 2022-05-25 | Fraud detection systems and methods |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12505445B2 (en) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12323454B2 (en) | 2021-05-25 | 2025-06-03 | Early Warning Services, Llc | Fraud networks |
| US20230031123A1 (en) * | 2021-08-02 | 2023-02-02 | Verge Capital Limited | Distributed adaptive machine learning training for interaction exposure detection and prevention |
| US20240095744A1 (en) * | 2022-09-21 | 2024-03-21 | Wells Fargo Bank, N.A. | Data element analysis for fraud mitigation |
| US12543145B2 (en) * | 2023-03-31 | 2026-02-03 | At&T Intellectual Property I, L.P. | System and method for detecting location anomalies of mobile devices |
| US12314956B2 (en) | 2023-04-28 | 2025-05-27 | T-Mobile Usa, Inc. | Dynamic machine learning models for detecting fraud |
| CN116582336A (en) * | 2023-05-26 | 2023-08-11 | 支付宝(杭州)信息技术有限公司 | A risk early warning method, device and equipment |
| US20250086656A1 (en) * | 2023-09-07 | 2025-03-13 | Jpmorgan Chase Bank, N.A. | Systems and methods for predicting and preventing social engineering scams in real time |
| US20250131438A1 (en) * | 2023-10-19 | 2025-04-24 | Capital One Services, Llc | Systems and methods to detect fraud and grant liability shift |
| US20250299196A1 (en) * | 2024-03-22 | 2025-09-25 | Capital One Services, Llc | Generating warnings for operation execution |
Citations (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080140576A1 (en) * | 1997-07-28 | 2008-06-12 | Michael Lewis | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| US20110238564A1 (en) * | 2010-03-26 | 2011-09-29 | Kwang Hyun Lim | System and Method for Early Detection of Fraudulent Transactions |
| US20130232074A1 (en) * | 2012-03-05 | 2013-09-05 | Mark Carlson | System and Method for Providing Alert Messages with Modified Message Elements |
| WO2014000741A1 (en) * | 2012-06-28 | 2014-01-03 | Ista Danmark A/S | Data integration |
| US20180041899A1 (en) * | 2013-09-13 | 2018-02-08 | Network Kinetix, LLC | System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network |
| US20200082407A1 (en) * | 2015-07-10 | 2020-03-12 | Dyron Clower | Instant funds availablity risk assessment and real-time fraud alert system and method |
| WO2021029878A1 (en) * | 2019-08-13 | 2021-02-18 | Visa International Service Association | System, method, and computer program product for real-time automated teller machine fraud detection and prevention |
| US20210158356A1 (en) * | 2019-11-27 | 2021-05-27 | EMC IP Holding Company LLC | Fraud Mitigation Using One or More Enhanced Spatial Features |
| US20210233088A1 (en) * | 2020-01-24 | 2021-07-29 | Mastercard International Incorporated | Systems and methods to reduce fraud transactions using tokenization |
| US20210326884A1 (en) * | 2014-01-09 | 2021-10-21 | Capital One Services, Llc | Method and system for providing alert messages related to suspicious transactions |
| US20220027750A1 (en) * | 2020-07-22 | 2022-01-27 | Paypal, Inc. | Real-time modification of risk models based on feature stability |
| US20220108331A1 (en) * | 2020-10-07 | 2022-04-07 | Mastercard International Incorporated | Systems and methods for detection of and response to account range fraud attacks |
| US20220245641A1 (en) * | 2021-02-04 | 2022-08-04 | Visa International Service Association | Intelligent recurring transaction processing and fraud detection |
| US20220358508A1 (en) * | 2021-05-08 | 2022-11-10 | Mastercard International Incorporated | Methods and systems for predicting account-level risk scores of cardholders |
| US11748757B1 (en) * | 2019-04-19 | 2023-09-05 | Mastercard International Incorporated | Network security systems and methods for detecting fraud |
| US20230298031A1 (en) * | 2020-06-29 | 2023-09-21 | Stripe, Inc. | Systems and methods for identity graph based fraud detection |
| US20230360051A1 (en) * | 2016-03-25 | 2023-11-09 | State Farm Mutual Automobile Insurance Company | Detecting unauthorized online applications using machine learning |
-
2022
- 2022-05-25 US US17/824,688 patent/US12505445B2/en active Active
Patent Citations (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080140576A1 (en) * | 1997-07-28 | 2008-06-12 | Michael Lewis | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| US20110238564A1 (en) * | 2010-03-26 | 2011-09-29 | Kwang Hyun Lim | System and Method for Early Detection of Fraudulent Transactions |
| US20130232074A1 (en) * | 2012-03-05 | 2013-09-05 | Mark Carlson | System and Method for Providing Alert Messages with Modified Message Elements |
| WO2014000741A1 (en) * | 2012-06-28 | 2014-01-03 | Ista Danmark A/S | Data integration |
| US20180041899A1 (en) * | 2013-09-13 | 2018-02-08 | Network Kinetix, LLC | System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network |
| US20210326884A1 (en) * | 2014-01-09 | 2021-10-21 | Capital One Services, Llc | Method and system for providing alert messages related to suspicious transactions |
| US20200082407A1 (en) * | 2015-07-10 | 2020-03-12 | Dyron Clower | Instant funds availablity risk assessment and real-time fraud alert system and method |
| US20230360051A1 (en) * | 2016-03-25 | 2023-11-09 | State Farm Mutual Automobile Insurance Company | Detecting unauthorized online applications using machine learning |
| US11748757B1 (en) * | 2019-04-19 | 2023-09-05 | Mastercard International Incorporated | Network security systems and methods for detecting fraud |
| WO2021029878A1 (en) * | 2019-08-13 | 2021-02-18 | Visa International Service Association | System, method, and computer program product for real-time automated teller machine fraud detection and prevention |
| US20210158356A1 (en) * | 2019-11-27 | 2021-05-27 | EMC IP Holding Company LLC | Fraud Mitigation Using One or More Enhanced Spatial Features |
| US20210233088A1 (en) * | 2020-01-24 | 2021-07-29 | Mastercard International Incorporated | Systems and methods to reduce fraud transactions using tokenization |
| US20230298031A1 (en) * | 2020-06-29 | 2023-09-21 | Stripe, Inc. | Systems and methods for identity graph based fraud detection |
| US20220027750A1 (en) * | 2020-07-22 | 2022-01-27 | Paypal, Inc. | Real-time modification of risk models based on feature stability |
| US20220108331A1 (en) * | 2020-10-07 | 2022-04-07 | Mastercard International Incorporated | Systems and methods for detection of and response to account range fraud attacks |
| US20220245641A1 (en) * | 2021-02-04 | 2022-08-04 | Visa International Service Association | Intelligent recurring transaction processing and fraud detection |
| US20220358508A1 (en) * | 2021-05-08 | 2022-11-10 | Mastercard International Incorporated | Methods and systems for predicting account-level risk scores of cardholders |
Non-Patent Citations (4)
| Title |
|---|
| Choudhury et al., "An Efficient Way to Detect Credit Card Fraud Using Machine Learning Methodologies," 978-1-5386-5657-01 IEEE 2018 (Year: 2018). * |
| Shen et al., "Deep Q-Network-ased Adaptive Alert Threshold Selection Policy for Payment Fraud Systems in Retail Banking," arXiv:2010.11062v1 (cs.LG] 2020 (Year: 2020). * |
| Choudhury et al., "An Efficient Way to Detect Credit Card Fraud Using Machine Learning Methodologies," 978-1-5386-5657-01 IEEE 2018 (Year: 2018). * |
| Shen et al., "Deep Q-Network-ased Adaptive Alert Threshold Selection Policy for Payment Fraud Systems in Retail Banking," arXiv:2010.11062v1 (cs.LG] 2020 (Year: 2020). * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20220383323A1 (en) | 2022-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12505445B2 (en) | Fraud detection systems and methods | |
| US10785212B2 (en) | Automated access data provisioning | |
| US12045357B2 (en) | System for designing and validating fine grained fraud detection rules | |
| US10552828B2 (en) | Multiple tokenization for authentication | |
| CN112823368B (en) | Tokenized contactless transactions via cloud-based biometric identification and authentication | |
| US20230196377A1 (en) | Digital Access Code | |
| US20140310160A1 (en) | Alert System with Multiple Transaction Indicators | |
| US20140344155A1 (en) | Out of band authentication and authorization processing | |
| US10489565B2 (en) | Compromise alert and reissuance | |
| US11432155B2 (en) | Method and system for relay attack detection | |
| US20160217464A1 (en) | Mobile transaction devices enabling unique identifiers for facilitating credit checks | |
| US12137102B2 (en) | Methods and systems for authentication for high-risk communications | |
| EP3616111B1 (en) | System and method for generating access credentials | |
| US20240004965A1 (en) | Data value routing system and method | |
| US11368460B2 (en) | System and method for identity verification | |
| US20150347965A1 (en) | Systems and methods for reporting compromised card accounts | |
| US20170178138A1 (en) | System and method for adding a dynamic security code to remote purchases | |
| EP3776425B1 (en) | Secure authentication system and method | |
| EP4179699B1 (en) | Engine for configuring authentication of access requests | |
| US20220101328A1 (en) | Systems, methods, and devices for assigning a transaction risk score | |
| WO2023055345A1 (en) | Device security with one-way function | |
| US20250307814A1 (en) | Amalgamated quick response ("qr")-powered, non-fungible token ("nft")-scoring-based protege money transfer technology | |
| US20240348444A1 (en) | Secure interaction using uni-directional data correlation tokens |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: EARLY WARNING SERVICES, LLC, ARIZONA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BURKE, CHRIS;KOLLAR, NAGARAJ;BELLMAN, JACOB;AND OTHERS;SIGNING DATES FROM 20220610 TO 20220728;REEL/FRAME:060692/0621 Owner name: EARLY WARNING SERVICES, LLC, ARIZONA Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:BURKE, CHRIS;KOLLAR, NAGARAJ;BELLMAN, JACOB;AND OTHERS;SIGNING DATES FROM 20220610 TO 20220728;REEL/FRAME:060692/0621 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ALLOWED -- NOTICE OF ALLOWANCE NOT YET MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |